There are various solutions to make wireless networks more secure. WPA, WEP, all sorts of encryption etc. Well, there is one company that actually developed a physical wireless security protection!!! EM-Sec technologies developed coating for internal surfaces of rooms that blocks electromagnetic signals. This coating creates an electromagnetic shield which makes it impossible for hackers to capture data. I think it is a pretty interesting option which is easy to implement and that gives good results. Plus you dont have to worry whether hackers could break your wi-fi network access key.
Apparently trend Micro purchased Hijack This utility. Here is the post on the official HijackThis homepage from the developer: As some of you might have seen several IT news websites are offering Trend Micro HijackThis 2.00 beta. An official statement will be posted on their website soon, but since this is a public beta of theirs I figured it'd be best if I answered the question I'm going to get asked a lot, right now. This is not fake, I sold HijackThis to TrendMicro. Their product incorporates all changes, updates and fixes that I was planning on adding in the v1.99.2 release. I made sure of that and I hope no one will be disappointed with it. While TrendMicro does not officially support HijackThis yet, I expect they will once it goes final. I sold HijackThis because I had been sitting on an unfinished update for over a year and I still could not make enough time to finish it. My uni classes are taking up a lot of time and I want to set my goals a bit wider than just the antispyware business (though I still love it). Sitting on an unfinished product until it becomes obsolete is not useful, so I decided to transfer the responsibility to TrendMicro (who have also taken care of my CWShredder) so they can give it proper attention and support. Where the will take HijackThis, I do not know - but I am sure they will respect its goals and what it stands for.
Symantec published Internet Security Report XI in its Security Response Weblog. Here is the URL of the post on the blog: http://www.symantec.com/enterprise/security_response/weblog/2007/03/internet_security_threat_repor.html The report describes various trends in web attacks, phishing, spam and security risks observed by the researchers. The full paper is available here: http://eval.symantec.com/mktginfo/enterprise/white_papers/ent-whitepaper_internet_security_threat_report_xi_03_2007.en-us.pdf Key findings are available here: http://eval.symantec.com/mktginfo/enterprise/white_papers/ent-whitepaper_internet_security_threat_report_xi_keyfindings_03_2007.en-us.pdf
vLite reached version 0.95 beta. Changelog: new: Automatic registry defragmentation new: Setup memory requirement tweak (32bit) new: Image splitting support new: 'Paint' new: 'Desktop Window Manager' new: 'Application Experience' new: 'Windows Media Player' new: 'Windows Media Codecs' new: 'Wordpad' new: 'Sound Recorder' new: 'System Information' new: 'Internet Small Computer System Interface (iSCSI)' upd: 'Snipping Tool' separated from the Tablet PC upd: 'Remote Desktop Client' separated from the Remote Desktop upd: Printers separated fix: ISO booting (BCD 0xc000000f Error) rem: 'Component Cache' removed vLite is a tool for customizing the Windows Vista installation before actually installing it.Main features are: remove components integrate drivers split/merge Vista installation CDs into a single image apply tweaks make bootable CD/DVD Windows Vista from Microsoft takes a lot of resources, we all know that. vLite provides you with an easy removal of the unwanted components in order to make Vista run faster and to your liking.This tool doesn't use any kind of hacking, all files and registry entries are protected as they would be if you install the unedited version only with the changes you select.It configures the installation directly before the installation, meaning you'll have to remake the ISO and reinstall it. This method is much cleaner, not to mention easier and more logical than doing it after installation on every reinstall.
VMware published a report comparing performance of various versions of Xen hypervisor against its ESX server. You can read the report here: http://www.vmware.com/pdf/hypervisor_performance.pdf Naturally ESX won in the report ( If VMware lost i guess they would not publish it). In response to this report Simon Crosby, CTO of Xen Source, wrote his opinion defending Xen and questioning some of the benchmark results. It is available on his official blog: http://blogs.xensource.com/simon/?p=12 Xen Source also produced their own report. Unfortunately VMware prohibits publishing results of benchmarks involving VMware products unless they were approved by the company so ESX results were cut out from the paper. Personally, i like both products. I just hope that both companies will be honest and transparent about the benchmarks so users won't see another "Get the facts" campaign.